generated from OWASP/www-projectchapter-example
-
-
Notifications
You must be signed in to change notification settings - Fork 25
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
341 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,341 @@ | ||
docs_list_title: Developer Guide | ||
docs: | ||
|
||
- title: '1. Introduction' | ||
url: introduction | ||
|
||
- title: '2. Foundations' | ||
url: foundations | ||
|
||
- title: '2.1 Security fundamentals' | ||
url: foundations/security_fundamentals | ||
|
||
- title: '2.2 Secure development and integration' | ||
url: foundations/secure_development | ||
|
||
- title: '2.3 Principles of security' | ||
url: foundations/security_principles | ||
|
||
- title: '2.4 Principles of cryptography' | ||
url: foundations/crypto_principles | ||
|
||
- title: '2.5 OWASP Top 10' | ||
url: foundations/owasp_top_ten | ||
|
||
- title: '3. Requirements' | ||
url: requirements | ||
|
||
- title: '3.1 Requirements in practice' | ||
url: requirements/requirements_in_practice | ||
|
||
- title: '3.2 Risk profile' | ||
url: requirements/risk_profile | ||
|
||
- title: '3.3 OpenCRE' | ||
url: requirements/opencre | ||
|
||
- title: '3.4 SecurityRAT' | ||
url: requirements/security_rat | ||
|
||
- title: '3.5 ASVS requirements' | ||
url: requirements/asvs | ||
|
||
- title: '3.6 MAS requirements' | ||
url: requirements/mas | ||
|
||
- title: '3.7 SKF requirements' | ||
url: requirements/skf | ||
|
||
- title: '4. Design' | ||
url: design | ||
|
||
- title: '4.1 Threat modeling' | ||
url: design/threat_modeling | ||
|
||
- title: '4.1.1 Threat modeling in practice' | ||
url: design/threat_modeling/practical_threat_modeling | ||
|
||
- title: '4.1.2 pytm' | ||
url: design/threat_modeling/pytm | ||
|
||
- title: '4.1.3 Threat Dragon' | ||
url: design/threat_modeling/threat_dragon | ||
|
||
- title: '4.1.4 Cornucopia' | ||
url: design/threat_modeling/cornucopia | ||
|
||
- title: '4.1.5 LINDDUN GO' | ||
url: design/threat_modeling/linddun_go | ||
|
||
- title: '4.1.6 Threat Modeling toolkit' | ||
url: design/threat_modeling/toolkit | ||
|
||
- title: '4.2 Web application checklist' | ||
url: design/web_app_checklist | ||
|
||
- title: '4.2.1 Checklist: Define Security Requirements' | ||
url: design/web_app_checklist/define_security_requirements | ||
|
||
- title: '4.2.2 Checklist: Leverage Security Frameworks and Libraries' | ||
url: design/web_app_checklist/frameworks_libraries | ||
|
||
- title: '4.2.3 Checklist: Secure Database Access' | ||
url: design/web_app_checklist/secure_database_access | ||
|
||
- title: '4.2.4 Checklist: Encode and Escape Data' | ||
url: design/web_app_checklist/encode_escape_data | ||
|
||
- title: '4.2.5 Checklist: Validate All Inputs' | ||
url: design/web_app_checklist/validate_inputs | ||
|
||
- title: '4.2.6 Checklist: Implement Digital Identity' | ||
url: design/web_app_checklist/digital_identity | ||
|
||
- title: '4.2.7 Checklist: Enforce Access Controls' | ||
url: design/web_app_checklist/access_controls | ||
|
||
- title: '4.2.8 Checklist: Protect Data Everywhere' | ||
url: design/web_app_checklist/protect_data | ||
|
||
- title: '4.2.9 Checklist: Implement Security Logging and Monitoring' | ||
url: design/web_app_checklist/security_logging_and_monitoring | ||
|
||
- title: '4.2.10 Checklist: Handle all Errors and Exceptions' | ||
url: design/web_app_checklist/handle_errors_and_exceptions | ||
|
||
- title: '4.3 MAS checklist' | ||
url: design/mas_checklist | ||
|
||
- title: '5. Implementation' | ||
url: implementation | ||
|
||
- title: '5.1 Documentation' | ||
url: implementation/documentation | ||
|
||
- title: '5.1.1 Top 10 Proactive Controls' | ||
url: implementation/documentation/proactive_controls | ||
|
||
- title: '5.1.2 Go Secure Coding Practices' | ||
url: implementation/documentation/go_scp | ||
|
||
- title: '5.1.3 Cheatsheet Series' | ||
url: implementation/documentation/cheatsheets | ||
|
||
- title: '5.2 Dependencies' | ||
url: implementation/dependencies | ||
|
||
- title: '5.2.1 Dependency-Check' | ||
url: implementation/dependencies/dependency_check | ||
|
||
- title: '5.2.2 Dependency-Track' | ||
url: implementation/dependencies/dependency_track | ||
|
||
- title: '5.2.3 CycloneDX' | ||
url: implementation/dependencies/cyclonedx | ||
|
||
- title: '5.3 Secure Libraries' | ||
url: implementation/secure_libraries | ||
|
||
- title: '5.3.1 ESAPI' | ||
url: implementation/secure_libraries/esapi | ||
|
||
- title: '5.3.2 CSRFGuard' | ||
url: implementation/secure_libraries/csrfguard | ||
|
||
- title: '5.3.3 OSHP' | ||
url: implementation/secure_libraries/oshp | ||
|
||
- title: '5.4 MASWE' | ||
url: implementation/maswe | ||
|
||
- title: '6. Verification' | ||
url: verification | ||
|
||
- title: '6.1 Guides' | ||
url: verification/guides | ||
|
||
- title: '6.1.1 WSTG' | ||
url: verification/guides/wstg | ||
|
||
- title: '6.1.2 MASTG' | ||
url: verification/guides/mastg | ||
|
||
- title: '6.1.3 ASVS' | ||
url: verification/guides/asvs | ||
|
||
- title: '6.2 Tools' | ||
url: verification/tools | ||
|
||
- title: '6.2.1 DAST tools' | ||
url: verification/tools/dast | ||
|
||
- title: '6.2.2 Amass' | ||
url: verification/tools/amass | ||
|
||
- title: '6.2.3 OWTF' | ||
url: verification/tools/owtf | ||
|
||
- title: '6.2.4 Nettacker' | ||
url: verification/tools/nettacker | ||
|
||
- title: '6.2.5 OSHP verification' | ||
url: verification/tools/oshp_verification | ||
|
||
- title: '6.3 Frameworks' | ||
url: verification/frameworks | ||
|
||
- title: '6.3.1 secureCodeBox' | ||
url: verification/frameworks/secure_codebox | ||
|
||
- title: '6.4 Vulnerability management' | ||
url: verification/vulnerability_management | ||
|
||
- title: '6.4.1 DefectDojo' | ||
url: verification/vulnerability_management/defectdojo | ||
|
||
- title: '7. Training and Education' | ||
url: training_education | ||
|
||
- title: '7.1 Vulnerable Applications' | ||
url: training_education/vulnerable_applications | ||
|
||
- title: '7.1.1 Juice Shop' | ||
url: training_education/vulnerable_applications/juice_shop | ||
|
||
- title: '7.1.2 WebGoat' | ||
url: training_education/vulnerable_applications/webgoat | ||
|
||
- title: '7.1.3 PyGoat' | ||
url: training_education/vulnerable_applications/pygoat | ||
|
||
- title: '7.1.4 Security Shepherd' | ||
url: training_education/vulnerable_applications/security_shepherd | ||
|
||
- title: '7.2 Secure Coding Dojo' | ||
url: training_education/secure_coding_dojo | ||
|
||
- title: '7.3 SKF education' | ||
url: training_education/skf_education | ||
|
||
- title: '7.4 SamuraiWTF' | ||
url: training_education/samuraiwtf | ||
|
||
- title: '7.5 OWASP Top 10 project' | ||
url: training_education/owasp_top_ten | ||
|
||
- title: '7.6 Mobile Top 10' | ||
url: training_education/mobile_top_ten | ||
|
||
- title: '7.7 API Top 10' | ||
url: training_education/api_top_ten | ||
|
||
- title: '7.8 WrongSecrets' | ||
url: training_education/wrongsecrets | ||
|
||
- title: '7.9 OWASP Snakes and Ladders' | ||
url: training_education/snakes_and_ladders | ||
|
||
- title: '8. Culture building and Process maturing' | ||
url: culture_building_and_process_maturing | ||
|
||
- title: '8.1 Security Culture' | ||
url: culture_building_and_process_maturing/security_culture | ||
|
||
- title: '8.2 Security Champions' | ||
url: culture_building_and_process_maturing/security_champions | ||
|
||
- title: '8.2.1 Security champions program' | ||
url: culture_building_and_process_maturing/security_champions/program | ||
|
||
- title: '8.2.2 Security Champions Guide' | ||
url: culture_building_and_process_maturing/security_champions/guide | ||
|
||
- title: '8.2.3 Security Champions Playbook' | ||
url: culture_building_and_process_maturing/security_champions/playbook | ||
|
||
- title: '8.3 SAMM' | ||
url: culture_building_and_process_maturing/samm | ||
|
||
- title: '8.4 ASVS process' | ||
url: culture_building_and_process_maturing/asvs | ||
|
||
- title: '8.5 MAS process' | ||
url: culture_building_and_process_maturing/mas | ||
|
||
- title: '9. Operations' | ||
url: operation | ||
|
||
- title: '9.1 DevSecOps Guideline' | ||
url: operations/devsecops_guideline | ||
|
||
- title: '9.2 Coraza WAF' | ||
url: operations/coraza_waf | ||
|
||
- title: '9.3 ModSecurity WAF' | ||
url: operations/modsecurity_waf/ | ||
|
||
- title: '9.4 OWASP CRS' | ||
url: operations/crs | ||
|
||
- title: '10. Metrics' | ||
url: metrics | ||
|
||
- title: '11. Security gap analysis' | ||
url: security_gap_analysis | ||
|
||
- title: '11.1 Guides' | ||
url: security_gap_analysis/guides | ||
|
||
- title: '11.1.1 SAMM gap analysis' | ||
url: security_gap_analysis/guides/samm | ||
|
||
- title: '11.1.2 ASVS gap analysis' | ||
url: security_gap_analysis/guides/asvs | ||
|
||
- title: '11.1.3 MAS gap analysis' | ||
url: security_gap_analysis/guides/mas | ||
|
||
- title: '11.2 BLT' | ||
url: security_gap_analysis/blt | ||
|
||
- title: '12. Appendices' | ||
url: appendices | ||
|
||
- title: '12.1 Implementation Do''s and Don''ts' | ||
url: appendices/implementation_dos_donts | ||
|
||
- title: '12.1.1 Container security' | ||
url: appendices/implementation_dos_donts/container_security | ||
|
||
- title: '12.1.2 Secure coding' | ||
url: appendices/implementation_dos_donts/secure_coding | ||
|
||
- title: '12.1.3 Cryptographic practices' | ||
url: appendices/implementation_dos_donts/cryptographic_practices | ||
|
||
- title: '12.1.4 Application spoofing' | ||
url: appendices/implementation_dos_donts/application_spoofing | ||
|
||
- title: '12.1.5 Content Security Policy (CSP)' | ||
url: appendices/implementation_dos_donts/content_security_policy | ||
|
||
- title: '12.1.6 Exception and error handling' | ||
url: appendices/implementation_dos_donts/exception_error_handling | ||
|
||
- title: '12.1.7 File management' | ||
url: appendices/implementation_dos_donts/file_management | ||
|
||
- title: '12.1.8 Memory management' | ||
url: appendices/implementation_dos_donts/memory_management | ||
|
||
- title: '12.2 Verification Do''s and Don''ts' | ||
url: appendices/verification_dos_donts | ||
|
||
- title: '12.2.1 Secure environment' | ||
url: appendices/verification_dos_donts/secure_environment | ||
|
||
- title: '12.2.2 System hardening' | ||
url: appendices/verification_dos_donts/system_hardening | ||
|
||
- title: '12.2.3 Open Source software' | ||
url: appendices/verification_dos_donts/open_source_software |